Data Hiding Technique Based on NFC-Enabled Smartphones

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Smart Card Reader Using NFC-Enabled Smartphones

Due to the increasing use of electronic systems in all fields of everyday life, users are now having to deal with electronic identification and authentication practically every day. Password based authentication systems are neither secure nor particularly convenient for users. Here, we are presenting the idea of using an NFC-enabled mobile phone as a chip card reader for contactless smart cards...

متن کامل

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

Today’s smartphones and tablets offer compelling computing and storage capabilities enabling a variety of mobile applications with rich functionality. The integration of new interfaces, in particular near field communication (NFC) opens new opportunities for new applications and business models, as the most recent trend in industry for payment and ticketing shows. These applications require sto...

متن کامل

A Hybrid Transmission System Based on NFC-Enabled Mobile Phones

Taking advantage of the characteristics of high security, convenience, and low power consumption in Near Field Communication (NFC) technology, this paper proposes programs of using NFC to establish a connection for Bluetooth and WiFi transmission. The combination of NFC, Bluetooth and WiFi can avoid the complex process of searching devices, pairing or joining the LAN in the traditional Bluetoot...

متن کامل

A reversible data hiding scheme based on the Sudoku technique

Data hiding, also known as information hiding, plays an important role in information security for various purposes. Reversible data hiding is a technique that allows distortion-free recovery of both the cover image and the secret information. In this paper, we propose a new, reversible data hiding scheme that is based on the Sudoku technique and can achieve higher embedding capacity. The propo...

متن کامل

A Robust Data Hiding Technique based on LSB Matching

Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into numbe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2020

ISSN: 1877-0509

DOI: 10.1016/j.procs.2020.04.260